Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
2016 was the year of ransomware, with hackers focusing their attention on exploiting Internet users and businesses around the world for...
Last week we launched Malwarebytes 3.0, our next-generation antivirus replacement. We also touched on domain generating algorithms (DGA), went up-close and...
Rootkits are tools and techniques used to hide (potentially malicious) modules from being noticed by system monitoring. Many people, hearing the...
Last week, we commented on Gooligan, homed in on a fake WhatsApp phishing email, and discussed about a rogue Chrome extension...
Last week, we took a look at a ransomware called PrincessLocker, of which researcher Hasherezade created its decryptor. At the same...
A new ransomware, TeleCrypt appeared recently carrying some new ideas. While most ransomware communicates with their C&C over simple HTTP-based protocols,...
Last week, we asked our blog readers what Malwarebytes Labs can do to make our awesome content more awesome. Those who...
PrincessLocker ransomware has appeared some time ago and has drawn out attention by using the same template of the site for...
So in an effort to continue bringing you awesome security news and information to help you stay safe online, we want...
Contributors
Threat Center
Podcast
Glossary
Scams